Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Issue #25558: Use compile-time asserts. | Serhiy Storchaka | 2015-11-07 | 1 | -1/+1 |
| | |||||
* | Merge 3.4 (os.urandom) | Victor Stinner | 2015-10-01 | 1 | -0/+2 |
|\ | |||||
| * | Issue #25003: os.urandom() doesn't use getentropy() on Solaris because | Victor Stinner | 2015-10-01 | 1 | -4/+8 |
| | | | | | | | | | | getentropy() is blocking, whereas os.urandom() should not block. getentropy() is supported since Solaris 11.3. | ||||
* | | Issue #25003: On Solaris 11.3 or newer, os.urandom() now uses the getrandom() | Victor Stinner | 2015-10-01 | 1 | -15/+34 |
| | | | | | | | | | | | | function instead of the getentropy() function. The getentropy() function is blocking to generate very good quality entropy, os.urandom() doesn't need such high-quality entropy. | ||||
* | | py_getrandom(): getrandom() *can* return EINTR | Victor Stinner | 2015-07-30 | 1 | -1/+0 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | See the latest version of getrandom() manual page: http://man7.org/linux/man-pages/man2/getrandom.2.html#NOTES The behavior when a call to getrandom() that is blocked while reading from /dev/urandom is interrupted by a signal handler depends on the initialization state of the entropy buffer and on the request size, buflen. If the entropy is not yet initialized, then the call will fail with the EINTR error. If the entropy pool has been initialized and the request size is large (buflen > 256), the call either succeeds, returning a partially filled buffer, or fails with the error EINTR. If the entropy pool has been initialized and the request size is small (buflen <= 256), then getrandom() will not fail with EINTR. Instead, it will return all of the bytes that have been requested. Note: py_getrandom() calls getrandom() with flags=0. | ||||
* | | (Merge 3.4) Issue #22585: os.urandom() now releases the GIL when the | Victor Stinner | 2015-03-30 | 1 | -6/+14 |
|\ \ | |/ | | | | | getentropy() is used (OpenBSD 5.6+). | ||||
| * | Issue #22585: os.urandom() now releases the GIL when the getentropy() is used | Victor Stinner | 2015-03-30 | 1 | -6/+14 |
| | | | | | | | | (OpenBSD 5.6+). | ||||
| * | Issue #22585: On OpenBSD 5.6 and newer, os.urandom() now calls getentropy(), | Victor Stinner | 2014-12-21 | 1 | -7/+41 |
| | | | | | | | | instead of reading /dev/urandom, to get pseudo-random bytes. | ||||
* | | Issue #22181: os.urandom() now releases the GIL when the getrandom() | Victor Stinner | 2015-03-30 | 1 | -2/+11 |
| | | | | | | | | implementation is used. | ||||
* | | Issue #23752: _Py_fstat() is now responsible to raise the Python exception | Victor Stinner | 2015-03-30 | 1 | -2/+1 |
| | | | | | | | | Add _Py_fstat_noraise() function when a Python exception is not welcome. | ||||
* | | Issue #23707: On UNIX, os.urandom() now calls the Python signal handler when | Victor Stinner | 2015-03-19 | 1 | -19/+11 |
| | | | | | | | | | | | | | | read() is interrupted by a signal. dev_urandom_python() now calls _Py_read() helper instead of calling directly read(). | ||||
* | | Issue #22181: Fix dev_urandom_noraise(), try calling py_getrandom() before | Victor Stinner | 2015-03-19 | 1 | -4/+4 |
| | | | | | | | | opening /dev/urandom. | ||||
* | | Issue #22181: The availability of the getrandom() is now checked in configure, | Victor Stinner | 2015-03-19 | 1 | -8/+5 |
| | | | | | | | | | | | | and stored in pyconfig.h as the new HAVE_GETRANDOM_SYSCALL define. Fix os.urandom() tests using file descriptors if os.urandom() uses getrandom(). | ||||
* | | Issue #22181: On Linux, os.urandom() now uses the new getrandom() syscall if | Victor Stinner | 2015-03-18 | 1 | -6/+84 |
| | | | | | | | | | | | | available, syscall introduced in the Linux kernel 3.17. It is more reliable and more secure, because it avoids the need of a file descriptor and waits until the kernel has enough entropy. | ||||
* | | Issue #23694: Enhance _Py_open(), it now raises exceptions | Victor Stinner | 2015-03-17 | 1 | -7/+3 |
| | | | | | | | | | | | | | | | | * _Py_open() now raises exceptions on error. If open() fails, it raises an OSError with the filename. * _Py_open() now releases the GIL while calling open() * Add _Py_open_noraise() when _Py_open() cannot be used because the GIL is not held | ||||
* | | Issue #23152: Implement _Py_fstat() to support files larger than 2 GB on ↵ | Steve Dower | 2015-02-21 | 1 | -3/+3 |
| | | | | | | | | | | | | Windows. fstat() may fail with EOVERFLOW on files larger than 2 GB because the file size type is an signed 32-bit integer. | ||||
* | | Issue #22585: On OpenBSD 5.6 and newer, os.urandom() now calls getentropy(), | Victor Stinner | 2014-12-21 | 1 | -4/+35 |
| | | | | | | | | instead of reading /dev/urandom, to get pseudo-random bytes. | ||||
* | | Removed duplicated words in in comments and docs. | Serhiy Storchaka | 2014-12-01 | 1 | -1/+1 |
|\ \ | |/ | |||||
| * | Removed duplicated words in in comments and docs. | Serhiy Storchaka | 2014-12-01 | 1 | -1/+1 |
| | | |||||
* | | Issue21393 Use CryptReleaseContext to release Crypt handle on Windows | Tim Golden | 2014-05-06 | 1 | -1/+1 |
| | | |||||
* | | Issue #21393: random.c: on Windows, close the hCryptProv handle at exit | Victor Stinner | 2014-05-02 | 1 | -3/+6 |
|/ | |||||
* | Issue #21207: Detect when the os.urandom cached fd has been closed or ↵ | Antoine Pitrou | 2014-04-26 | 1 | -10/+39 |
| | | | | replaced, and open it anew. | ||||
* | Issue #16136: Remove VMS support and VMS-related code | Christian Heimes | 2013-12-21 | 1 | -33/+4 |
| | |||||
* | ssue #19183: Implement PEP 456 'secure and interchangeable hash algorithm'. | Christian Heimes | 2013-11-20 | 1 | -6/+7 |
| | | | | Python now uses SipHash24 on all major platforms. | ||||
* | Fix compiler warning in win32_urandom(): explicit cast to DWORD in | Victor Stinner | 2013-11-15 | 1 | -1/+1 |
| | | | | CryptGenRandom() | ||||
* | merge with 3.3 | Georg Brandl | 2013-10-06 | 1 | -2/+3 |
|\ | |||||
| * | Closes #15213: update comment for _PyOS_URandom | Georg Brandl | 2013-10-06 | 1 | -2/+3 |
| | | |||||
* | | Issue #18756: os.urandom() now uses a lazily-opened persistent file ↵ | Antoine Pitrou | 2013-08-30 | 1 | -13/+42 |
| | | | | | | | | descriptor, so as to avoid using many file descriptors when run in parallel from multiple threads. | ||||
* | | Issue #18571: Implementation of the PEP 446: file descriptors and file handles | Victor Stinner | 2013-08-27 | 1 | -2/+2 |
| | | | | | | | | | | are now created non-inheritable; add functions os.get/set_inheritable(), os.get/set_handle_inheritable() and socket.socket.get/set_inheritable(). | ||||
* | | Issue #18756: Improve error reporting in os.urandom() when the failure is ↵ | Antoine Pitrou | 2013-08-16 | 1 | -2/+6 |
|\ \ | |/ | | | | | due to something else than /dev/urandom not existing. | ||||
| * | Issue #18756: Improve error reporting in os.urandom() when the failure is ↵ | Antoine Pitrou | 2013-08-16 | 1 | -2/+6 |
| | | | | | | | | due to something else than /dev/urandom not existing. | ||||
* | | Drop support for Windows 2000; allow any XP API (but not Vista+). | Martin v. Löwis | 2013-01-25 | 1 | -30/+3 |
|/ | | | | | Drop SDK version configuration for Tk compilation, to not bind it to W2k anymore. Binding it to XP would conflict with Tk's own binding of tkMenu to W2k. | ||||
* | Issue #15340: Fix importing the random module when /dev/urandom cannot be ↵ | Antoine Pitrou | 2012-09-07 | 1 | -1/+2 |
| | | | | | | opened. This was a regression caused by the hash randomization patch. | ||||
* | enable hash randomization by default | Benjamin Peterson | 2012-02-21 | 1 | -11/+0 |
| | |||||
* | ensure no one tries to hash things before the random seed is found | Benjamin Peterson | 2012-02-21 | 1 | -4/+8 |
| | |||||
* | Fix typo in conditional. | Georg Brandl | 2012-02-20 | 1 | -1/+1 |
| | |||||
* | Issue #13703: add a way to randomize the hash values of basic types (str, ↵ | Georg Brandl | 2012-02-20 | 1 | -0/+302 |
bytes, datetime) in order to make algorithmic complexity attacks on (e.g.) web apps much more complicated. The environment variable PYTHONHASHSEED and the new command line flag -R control this behavior. |